1.1 List and Describe The Most Common Threats Against Contemporary Information Systems
1.1 List and Describe The Most Common Threats Against Contemporary Information Systems
1.1 List and Describe The Most Common Threats Against Contemporary Information Systems
1.1 List and describe the most common threats against contemporary
information systems.
management decisions.
2. Corporate servers: Hacking, viruses and worms, theft and fraud, vandalism,
radiation
failure, and software failure. Power failures, floods, fires, or other natural
data from being lost, destroyed, or falling into the wrong hands.
1.2 Define malware and distinguish among a virus, a worm, and a Trojan
horse.
Malware spy-ware programs that gather information about a computer user without
permission.
2.Worm: A self-replicating virus that does not alter files but resides in active memory
1.3 Define a hacker and explain how hackers create security problems and
damage systems.
finding weaknesses in security protections used by Web sites and computer systems.
Hackers can threaten the security of computer systems and steal goods and
system.
1.4 Define computer crime. Provide two examples of crime in which computers
are targets and two examples in which computers are used as instruments of
crime.
Computer crime is defined as the commission of illegal acts through the use of a
negligently or deliberately
voice mail
1.5 Define identity theft and phishing and explain why identity theft is such a
big problem today.
Because of the Internet has made it easy for identity thieves to use
stolen information because goods can be purchased online without any personal
interaction.
1.6 Describe the security and system reliability problems created by employee.
The largest financial threats to businesses actually come from insiders, either through
theft and hacking or through lack of knowledge. Malicious intruders may sometimes
trick employees into revealing passwords and network access data through social
engineering. Employees can also introduce faulty data or improperly process data.
with because it isn’t caught until too late, and the consequences may be disastrous.
Also, administrative error can occur at any level and through any operation or
1.7 Explain how software defects affect system reliability and security.
can mean medical equipment that fails or telephones that do not carry
means customers are under- or over-billed. Or, it could mean that the
business orders more inventory than it needs. Or an automobile’s braking
2.1 Explain how security and control provide value for businesses.
1. Firms relying on computer systems for their core business functions can lose
business plans, lose much of their value if they are revealed to outsiders or if
2.2 Describe the relationship between security and control and recent U.S.
Legal actions requiring electronic evidence and computer forensics also require
preservation, and analysis of data held on or retrieved from computer storage media
in such a way that the information can be used as evidence in the court of law.
2. Gramm-Leach-Bliley Act
3. Sarbanes-Oxley Act
3. What are the components of an organizational framework for security and control?
3.1 Define general controls and describe each type of general control.
General controls govern the design, security, and use of computer programs and
the security of data files in general throughout the organization’s information
technology infrastructure.
3.2 Define application controls and describe each type of application control.
They include both automated and manual procedures that ensure that only
1. Input controls: Check data for accuracy and completeness when they enter the
system. There are specific input controls for input authorization, data
2. Processing controls: Establish that data are complete and accurate during
updating.
3. Output controls: Ensure that the results of computer processing are accurate, complete, and
properly distributed.
3.3 Describe the function of risk assessment and explain how it is conducted
A risk assessment determines the level of risk to the firm if a specific activity or process is not
properly controlled.
3.4 Define and describe the following: Security policy, acceptable use
policy, and identity management.
security goals, and identifying the mechanisms for achieving these goals. The security
policy drives policies determining acceptable use of the firm’s information resources and
An acceptable use policy (AUP) defines acceptable uses of the firm’s information
resources and computing equipment, including desktop and laptop computers, wireless devices,
telephones, and the Internet. The policy should clarify company policy regarding privacy, user
responsibility, and personal use of company equipment and networks. A good AUP defines
unacceptable and acceptable actions for each user and specifies consequences for
identifying valid system users and controlling their access to system resources. It includes policies
for identifying and authorizing different categories of system users, specifying what systems or
portions of systems each user is allowed to access, and the processes and technologies for
Comprehensive and systematic MIS auditing organizations determine the effectiveness of security
and controls for their information systems. An MIS audit identifies all of the controls that govern
individual information systems and assesses their effectiveness. Control weaknesses and their
probability of occurrence will be noted. The results of the audit can be used as guidelines for
strengthening
controls, if required.
4. What are the most important tools and technologies for safeguarding information resources?
4.1 Name and describe three authentication methods.
Authentication refers to the ability to know that a person is who he or she claims to
user
4.2 Describe the roles of firewalls, intrusion detection systems, and antivirus
incoming and outgoing network traffic. Firewalls prevent unauthorized users from
for the wrong source or destination, or by offering a proxy server with no access to
the internal documents and systems, or by restricting the types of messages that
get through, for example, e-mail. Further, many authentication controls have been
Intrusion detection systems monitor the most vulnerable points or “hot spots” in a
network to detect and deter unauthorized intruders. These systems often also
monitor events as they happen to look for security attacks in progress. Sometimes
Antivirus software is designed to check computer systems and drives for the
presence of computer viruses and worms and often eliminates the malicious
programs. Often the software can eliminate the virus from the infected area. To be
4.4 Describe the role of encryption and digital certificates in a public key
infrastructure.
Digital certificates are data fields used to establish the identity of the
sender and to provide the receiver with the means to encode a reply.
party to know that the other parties are who they claim to be.
4.5 Distinguish between fault-tolerant and high-availability computing,
and between disaster recovery planning and business continuity Planning. Fault-
tolerant computer systems contain redundant hardware, software, and power supply
components that can back the system up and keep it running to prevent system failure.
Some systems simply cannot be allowed to stop, such as stock market systems or
processors, and disk storage devices to backup a system and keep it running. They
also can use special software routings or self-checking logic built into their circuitry
availability, helps firms recover quickly from a crash. Fault tolerance promises
availability computing environments are a minimum requirement for firms with heavy
networks for their internal operations. Disaster recovery planning devises plans for the
restoration of computing and communications services after they have been disrupted
focus primarily on the technical issues involved in keeping systems up and running,
such as which files to back up and the maintenance of backup computer systems or
disaster recovery services. Business continuity planning focuses on how the company
can restore business operations after a disaster strikes. The business continuity plan
identifies critical business processes and determines action plans for handling
mission-critical functions if systems go down.
computing.
with the company owning that data even though it’s stored offsite. The
company needs to make sure its data are protected at a level that
company needs to verify with the cloud provider how its corporate data
is segregated from data belonging to other companies and ask for proof
how the cloud provider will respond if a disaster strikes. Will the cloud
long will that take? Will the cloud provider submit to external audits and
security certifications?
Using software metrics and rigorous software testing are two measure for improving
Software metrics are objective assessments of the system in the form of quantified
jointly
measure the performance of a system and identify problems as they occur. Metrics
people
2. Coding walkthroughs: Once developers start writing software, these can be used to
3. Debugging: When errors are discovered, the source is found and eliminated